Yudi Satria Gondokaryono
Bandung Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yudi Satria Gondokaryono.
international conference on electrical engineering and informatics | 2009
Hendra Rahmawan; Yudi Satria Gondokaryono
In this research, four static load balancing algorithms: Round Robin, Randomized, Central Manager, and Threshold, are simulated and they performances are compared. The simulation is performed using discrete event simulator. Load indices used for Central Manager and Threshold algorithm are CPU, memory, and hard disk I/O. The simulation of the four algorithms is done against three types of programs that have different load dominance. The three programs have different dominance in CPU instruction load, memory access, and hard disk I/O. The simulation results analysis shows that, the choosing of static load balancing algorithms has significant influence against system performance. Based on execution time, it can be concluded that, Central Manager algorithm that use CPU or hard disk I/O as they load indices, is the best static load balancing algorithm that gives fastest execution time. Whereas based on load distribution in the system, it can be concluded that, Central Manager and Threshold algorithm that use memory, CPU, or hard disk I/O as they load indices, are two best static load balancing algorithm that able to balance loads well.
Archive | 2011
Jaka Sembiring; Edi Triono Nuryatno; Yudi Satria Gondokaryono
Many organizations apply EA as part of their IT management and planning activities. From their perspective, it would seem that EA should play an important role in strategic planning, alignment and prioritization. Today we know the four top EA frameworks, which are often used in preparing the EA. The four top EA frameworks are the Zachman, Gartner, TOGAF and FEA. But in reality we have to be sure whether the four top EA frameworks can be directly adopted into organizations. To answer these questions, we conducted a study of the basic functions and staging in the development of EA in order to obtain certainty on the indicators and requirements in main components of EA methodology development.In this study we will use qualitative methods with a strategy of inquiry using grounded theory. This process involves using multiple stages of data collection and refinements and finding interrelationship of categories of information. Two primary characteristics of this method are the constant comparison of data with emerging categories and theoretical sampling of different perspective to maximize the similarities and the differences of information.
international conference on cloud computing | 2012
Adityas Widjajarto; Suhono Harso Supangkat; Yudi Satria Gondokaryono; Ary Setijadi Prihatmanto
Under unconsolidated resources, cloud computing providers have to allocate some resources to fullfil client request based on the on-demand mode. Using the applications profile, Infrastructure-as-a-Service model can be developed. Basically, Infrastructure-as-a-Service model provides resources in the form of computation power (CPU-hours unit), storage (gigabytes unit), network bandwidth (Internet data transfer, GB per day unit), and electrical power (kWh). From service availability point of view, reference model is previously developed as a backup framework. In this research, the development of cloud computing reference model for on-demand services is based on both application characteristics and resources availability. The objective of development model in this research is to decrease idle resources.
frontiers of information technology | 2016
Ariana Tulus Purnomo; Yudi Satria Gondokaryono; Chang-Soo Kim
Payment transaction using mobile phone has some possibilities of risk. Mobile devices still not secure and need more attention in the security area. In this paper, we propose mutual authentication technique between client and merchant using encrypted QR Code. QR Code has been widely used in recent technology. Secure transmission of data transaction can be accommodated using encrypted QR Code. QR Code can store more information than a traditional barcode. This security system maintained by Public Key Infrastructure (PKI) will ensure an additional layer of security.
international conference on information technology systems and innovation | 2014
Mukti Winanda; Ardianto Satriawan; Yudi Satria Gondokaryono
Smart grid is a new breakthrough in terms of transmission and distribution power lines from power plants. All communication data transmission that occurs on the smart grid is done digitally, making it easier for operators to control and monitor every transmission data as well as monitor any equipment connected to the smart grid. However, the use of digital technologies makes the security becomes an important aspect of any communication that occurs in a smart grid system. The security will focus on the delivery and transmission of data transmitted from the power plant to any existing substations, as well as data communication that occurs between substations and also inside the substation. Data communications between substations is a very critical thing, so need for security mechanisms are applied to that communication. The addition of security against any communication will affect the performance of the data transmission in smart grid. The implementation of IPSec is used as security protocols are applied to each gateway that resides on each substations. This is done so that any communication between substations can be done safely. It is also necessary that the exact configuration of the encryption and authentication algorithms used in the implementation of IPSec protocol could potentially provide the best performance. Implementation substation network design on smart grid and security of data transmission is done by simulation using OPNET modeler 14.5.
ieee international conference on condition monitoring and diagnosis | 2012
B. Pharmasetiawan; Hakim Ad Dairi; Yudi Satria Gondokaryono; Anita Pharmatrisanti; Edy Subagja; Bambang Cahyono
Power transformer is one of the most important and expensive equipments in Electrical Utility Company. PT PLN Java-Bali Transmission and Load Dispatch Center (PT PLN P3B Jawa-Bali) started to renew the maintenance program for its equipments including power transformers since 2006 in order to reduce transformer failure. The maintenance program which is based on Condition-Based Maintenance (CBM) has several activities. This paper will report one of these activities which is Transformer Monitoring System (TMS) in Java-Bali. Based on their individual function, the architecture of the monitoring system is divided into two parts, which are the Field sub-system and the Data Collecting Center sub-system. The purpose of the monitoring system is to collect transformer parameters based on an on-line measurement and to indicate tranformers premature loss. The statistical model and physical model have been used to indicate transformer condition index and transformers component condition respectively. Clustering strategy consideration was made to accommodate the various transformer manufacturers and the various types of transformers owned by PT PLN.
frontiers of information technology | 2016
Annisa Istiqomah Arrahmah; Yudi Satria Gondokaryono; Kyung-Hyune Rhee
Fuzzy vault is one of the biometric cryptosystems that allows the cryptographic keys to be securely maintained depending on the biometric information. In last years, a development of this method is approached significantly to enhance the security level, reduce the flaws and accelerate the computational process. One of the important function in the fuzzy vault system is chaff point generator. Chaff points are produced to disguise the genuine points using a random or nonrandom generator. This function has a trade-off, it can become security flaws or compute-intensive process. In this paper, we propose a method to make a non-random chaff point generator for fuzzy vault by combining idea between M.T. Nguyens algorithm and M.K. Hanis algorithm. In our experiment, we use fingerprint minutiae as a biometric information in the proposed biometric cryptosystems. With this method, the fuzzy vault not only computationally fast but also secure.
2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC) | 2016
Arief Zulianto; Kuspriyanto; Yudi Satria Gondokaryono
Grid scheduling has been intensively studied, tools that enable the simulation of grids have been developed. These simulation tools have the common objective of developing and evaluating scheduling algorithms for grids. By using the simulation tools, knowledge about the behaviour of scheduling system will be more easily understood. However, knowledge about the method and how to use the tools is required. This paper will describe the use of SimDAG to simulate MinMin, MaxMin and HEFT scheduling algorithms in HPC.
international conference on information technology systems and innovation | 2015
Muhammad Rizkarmen; Rolan Mauludy Dahlan; Yudi Satria Gondokaryono
Rice is still a major source of carbohydrates in the food consumption pattern in Indonesia. Availability of rice in Indonesia faces the challenges on the production side due to the production cycle following the water cycle while consumption remained relatively unchanged by time. This study aims to map the structure of production, consumption, and distribution in West Java and built a computational platform that can provide strategic decision in rice distribution. The decision covers: calculate the potential supply and demand in each Bulogs warehouse, determine which warehouse that need to be extended, determine the amount of import needs, and determine the optimum rice distribution route between warehouses.
International Conference on ICT for Smart Society | 2013
Yudi Satria Gondokaryono; Bryan Yonathan; Yoanes Bandung
The key issue of this paper is how to build a knowledge society and knowledge economy for rural areas through the utilization of information and communication technology (ICT). The purpose is to apply and implement the product service system (PSS) information and multimedia access for learning communities in West Java, especially in rural or village. Our hope that the public welfare and quality of life can be improved.